WWT experts break down the complexity of deploying and managing Windows 10

If you’re responsible for migrating your organization to Windows 10, whether in the commercial or public sector, and your head’s not spinning with questions, you’re the exception to the rule. How are you going to unify endpoint management? How are you going to apply Windows 10 across thousands of machines without disruption? What tools do you need to deploy OS patches and updates? Our latest TEC37 webinar takes on these questions as we break down the complexity of deploying and managing Windows 10.

Our panel discussion was moderated by Wendell Layne, WWT’s end-user computing product manager, and our panelists included Steve Adams, partner technology strategist for Windows and devices from Microsoft; Dan Huber, a mobility solutions architect for WWT focused on digital experience; Kelly Ryan, a solutions architect for WWT focused on virtualization and Darrin Dennis, a solutions architect for WWT focused on all things Windows server infrastructure.

Below are a few of the key topics our panelists discussed:

  • How to effectively manage physical and virtual desktops as well as mobile devices without the need for disparate systems
  • New ways to deploy OS updates using Windows Insider Preview, Windows Current Branch and Current Branch for Business
  • How to use patch management to lock down Windows 10
  • VDI opportunities new to Windows 10

Watch our webinar on demand or read the full transcript. You can also catch the highlights by downloading our infographic, viewing slides from the eventsubscribing to our #TEC37 podcast channel or see what was on attendees’ minds by checking out the FAQs section below.

Watch our TEC37 Webinar ‘Deploy and Manage Windows 10 at Scale’ On Demand 1

FAQs

What’s the difference between virtual desktop infrastructure and application virtualization?

Kelly Ryan (Virtualization Architect, WWT): Virtual desktop is literally software based that emulates an actual physical desktop. It’s virtual and served up to give you a desktop look and feel.

Virtual application virtualization is a technology or concept where you can actually install an application and package that within its own construct, where it’s decoupled away from the operating system and is much more elastic. It’s packaged somewhat in its own virtual bubble, so to speak, allowing it to be much more versatile and leveraged in different areas within your actual enterprise.

Can you deep dive into some of the new Windows 10 deployment tools?

Steve Adams (Partner Technology Strategist, Microsoft): Our new tool suite truly allows that zero touch deployment experience. Let me give you an example. Let’s say, Wendell is on his way to Seattle and he’s driving cross-country. He ends up in Provo, Utah, drops his machine and breaks it. He still needs to get his job done, so what should he do? It used to be he’d call IT, say he broke his computer and needs a new one. IT would put his account on it and send him a new one within 48 hours. With Windows 10, we have this almost nirvana scenario, where with our tools like In Tune and Air Watch, we have the ability to move that all through the cloud. So in this scenario, Wendell would go to Staples or Best Buy, buy a $299 HP device, because it’s temporary. He would power up, turn on Windows 10 and the first thing it will ask him is if this machine is his work or personal machine. Once he selects work and puts in his work email and password, he’s up and running within 20 minutes and has Office 365 and all of his files and applications from that morning at his finger tips.

What kind of problems have you seen with Office 365 deployments that need to be remediated before an organization embarks on that transition?

Darrin Dennis (Mobility Solutions Architect, WWT): The problem we’re seeing is that organizations need to change the way they’re thinking about where security is happening. Threats are no longer just occurring from the outside; there are dangers lurking everywhere and it’s our responsibility as IT guys to stop fighting the day-to-day battle of who needs access to a file and off shoot that to the end users.

This process has worked in the past, but now organizations really need to mature and modernize. They’re not wrong; they’re just not quite where they need to be for a cloud first technology.

Microsoft CIO actually published a fantastic volume of material out on their website highlighting 22 best practices for securing Active Directory and I would highly recommend checking it out.